A Data-Driven Approach for Classifying and Predicting DDoS Attacks with Machine Learning


Authors : Prinshu Sharma; Unmukh Datta

Volume/Issue : Volume 9 - 2024, Issue 10 - October


Google Scholar : https://tinyurl.com/36hfabrn

Scribd : https://tinyurl.com/yuu4yf6d

DOI : https://doi.org/10.38124/ijisrt/IJISRT24OCT547

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : The importance of IoT security is growing as a result of the growing number of IoT devices and their many applications. Distributed denial of service (DDoS) assaults on IoT systems have become more frequent, sophisticated, and of a different kind, according to recent research on network security, making DDoS one of the most formidable dangers. Real, lucrative, and efficient cybercrimes are carried out using DDoS attacks. One of the most dangerous types of assaults in network security is the DDoS attack. ML-based DDoS-detection systems continue to face obstacles that negatively impact their accuracy. AI, which incorporates ML to detect cyberattacks, is the most often utilised approach for these goals. In this study, it is suggested that DDoS assaults in Software-Defined Networking be identified and countered using ML approaches. The F1-score, recall, accuracy, and precision of many ML techniques, including Cat Boost and Extra Tree classifier, are compared in the suggested model. DDoS-Net is designed to handle data imbalance effectively and incorporates thorough feature analysis to enhance the model's detection capabilities. Evaluation on the UNSW-NB15 dataset demonstrates the exceptional performance of DDoS-Net. The highest accuracy achieved by the machine learning algorithms Cat Boost and Extra Tree classifier is 90.78% and 90.27% respectively using the most familiar dataset. This work presents a strong and precise approach for DDoS attack detection, which greatly improves the cybersecurity environment and strengthens digital infrastructures against these ubiquitous threats.

Keywords : Denial-of-Service (DoS), Attack, Classification, Identification, Machine Learning.

References :

  1. S. Kumar, P. Tiwari, and M. Zymbler, “Internet of Things is a revolutionary approach for future technology enhancement: a review,” J. Big Data, 2019, doi: 10.1186/s40537-019-0268-2.
  2. M. Snehi and A. Bhandari, “Vulnerability retrospection of security solutions for software-defined Cyber-Physical System against DDoS and IoT-DDoS attacks,” Computer Science Review. 2021. doi: 10.1016/j.cosrev.2021.100371.
  3. R. K. C. Chang, “Defending against flooding-based distributed denial-of-service attacks: A tutorial,” IEEE Commun. Mag., 2002, doi: 10.1109/MCOM.2002.1039856.
  4. B. Patel, V. K. Yarlagadda, N. Dhameliya, K. Mullangi, and S. C. R. Vennapusa, “Advancements in 5G Technology: Enhancing Connectivity and Performance in Communication Engineering,” Eng. Int., vol. 10, no. 2, pp. 117–130, 2022, doi: 10.18034/ei.v10i2.715.
  5. R. K. Gupta, K. K. Almuzaini, R. K. Pateriya, K. Shah, P. K. Shukla, and R. Akwafo, “An Improved Secure Key Generation Using Enhanced Identity-Based Encryption for Cloud Computing in Large-Scale 5G,” Wirel. Commun. Mob. Comput., 2022, doi: 10.1155/2022/7291250.
  6. V. Rohilla, S. Chakraborty, and M. Kaur, “An Empirical Framework for Recommendation-based Location Services Using Deep Learning,” Eng. Technol. Appl. Sci. Res., 2022, doi: 10.48084/etasr.5126.
  7. P. Khuphiran, P. Leelaprute, P. Uthayopas, K. Ichikawa, and W. Watanakeesuntorn, “Performance comparison of machine learning models for DDoS attacks detection,” in 2018 22nd International Computer Science and Engineering Conference, ICSEC 2018, 2018. doi: 10.1109/ICSEC.2018.8712757.
  8. Z. M. Jiyad, A. Al Maruf, M. M. Haque, M. Sen Gupta, A. Ahad, and Z. Aung, “DDoS Attack Classification Leveraging Data Balancing and Hyperparameter Tuning Approach Using Ensemble Machine Learning with XAI,” in 2024 Third International Conference on Power, Control and Computing Technologies (ICPC2T), 2024, pp. 569–575. doi: 10.1109/ICPC2T60072.2024.10475035.
  9. A. M. Al-Eryani, E. Hossny, and F. A. Omara, “Efficient Machine Learning Algorithms for DDoS Attack Detection,” in 2024 6th International Conference on Computing and Informatics (ICCI), 2024, pp. 174–181. doi: 10.1109/ICCI61671.2024.10485168.
  10. S. Kaur, A. K. Sandhu, and A. Bhandari, “Feature Extraction and Classification of Application Layer DDoS Attacks using Machine Learning Models,” in 2023 International Conference on Communication, Security and Artificial Intelligence, ICCSAI 2023, 2023. doi: 10.1109/ICCSAI59793.2023.10421652.
  11. P. S. Patil, S. L. Deshpande, G. S. Hukkeri, R. H. Goudar, and P. Siddarkar, “Prediction of DDoS Flooding Attack using Machine Learning Models,” in Proceedings of the 3rd International Conference on Smart Technologies in Computing, Electrical and Electronics, ICSTCEE 2022, 2022. doi: 10.1109/ICSTCEE56972.2022.10100083.
  12. S. Tufail, S. Batool, and A. I. Sarwat, “A Comparative Study Of Binary Class Logistic Regression and Shallow Neural Network For DDoS Attack Prediction,” in Conference Proceedings - IEEE SOUTHEASTCON, 2022. doi: 10.1109/SoutheastCon48659.2022.9764108.
  13. W. Yustanti, N. Iriawan, and Irhamah, “Categorical encoder based performance comparison in preprocessing imbalanced multiclass classification,” Indones. J. Electr. Eng. Comput. Sci., 2023, doi: 10.11591/ijeecs.v31.i3.pp1705-1715.
  14. V. Rohilla, S. Chakraborty, and R. Kumar, “Deep learning based feature extraction and a bidirectional hybrid optimized model for location based advertising,” Multimed. Tools Appl., vol. 81, no. 11, pp. 16067–16095, May 2022, doi: 10.1007/s11042-022-12457-3.
  15. R. C. Chen, C. Dewi, S. W. Huang, and R. E. Caraka, “Selecting critical features for data classification based on machine learning methods,” J. Big Data, 2020, doi: 10.1186/s40537-020-00327-4.
  16. A. Bhandari, “Feature Engineering: Scaling, Normalization and Standardization,” Analytics Vidhya.
  17. P. Geurts, D. Ernst, and L. Wehenkel, “Extremely randomized trees,” Mach. Learn., vol. 63, no. 1, pp. 3–42, 2006, doi: 10.1007/s10994-006-6226-1.
  18. V. John, Z. Liu, C. Guo, S. Mita, and K. Kidono, “Real-time lane estimation Using Deep features and extra trees regression,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016. doi: 10.1007/978-3-319-29451-3_57.
  19. G. Mishra, D. Sehgal, and J. K. Valadi, “Quantitative Structure Activity Relationship study of the Anti-Hepatitis Peptides employing Random Forest and Extra Tree regressors,” Bioinformation, 2017, doi: 10.6026/97320630013060.
  20. A. V. Dorogush, V. Ershov, and A. Gulin, “CatBoost: gradient boosting with categorical features support,” pp. 1–7, 2018.
  21. L. Prokhorenkova, G. Gusev, A. Vorobev, A. V. Dorogush, and A. Gulin, “Catboost: Unbiased boosting with categorical features,” in Advances in Neural Information Processing Systems, 2018.
  22. H. Liu, L. Guo, H. Li, W. Zhang, and X. Bai, “Matching Areal Entities with CatBoost Ensemble Method,” J. Geo-Information Sci., 2022, doi: 10.12082/dqxxkx.2022.220050.

The importance of IoT security is growing as a result of the growing number of IoT devices and their many applications. Distributed denial of service (DDoS) assaults on IoT systems have become more frequent, sophisticated, and of a different kind, according to recent research on network security, making DDoS one of the most formidable dangers. Real, lucrative, and efficient cybercrimes are carried out using DDoS attacks. One of the most dangerous types of assaults in network security is the DDoS attack. ML-based DDoS-detection systems continue to face obstacles that negatively impact their accuracy. AI, which incorporates ML to detect cyberattacks, is the most often utilised approach for these goals. In this study, it is suggested that DDoS assaults in Software-Defined Networking be identified and countered using ML approaches. The F1-score, recall, accuracy, and precision of many ML techniques, including Cat Boost and Extra Tree classifier, are compared in the suggested model. DDoS-Net is designed to handle data imbalance effectively and incorporates thorough feature analysis to enhance the model's detection capabilities. Evaluation on the UNSW-NB15 dataset demonstrates the exceptional performance of DDoS-Net. The highest accuracy achieved by the machine learning algorithms Cat Boost and Extra Tree classifier is 90.78% and 90.27% respectively using the most familiar dataset. This work presents a strong and precise approach for DDoS attack detection, which greatly improves the cybersecurity environment and strengthens digital infrastructures against these ubiquitous threats.

Keywords : Denial-of-Service (DoS), Attack, Classification, Identification, Machine Learning.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe